Monthly Archives: December 2013

A warning about teenagers photos sharing. They end up in child pornography sites

pedopornografia-3We have repeatedly stressed the great importance of parental controls on the PC used by their children and the every day news give us ample confirmation.
Everything starts for playing: a mischievous photo of themselves sent to a person of whom you trust, that you know well or for which perhaps you’re in love. From there the picture take a path that teenagers cannot even imagine, and it’s not infrequent to reach dangerous virtual destinations: abuse of minors. The young users don’t have sufficient awareness of the network and its risks. The world data of virtual child pornography are alarming. That’s why making sexting can be very dangerous.

Usually the messages following this process: the girl sends them with a naughty photo. The boy receives them on the phone and forwards them to a friend or this subtracts them to him without his knowledge, or even, once the relationship ends, the ex-boyfriend spreads them purposely on social networks. Already at that point the way to that photo is at risk and the picture protagonist will no longer be able to manage it, to recover it or control it. Sucked from the network, the snapshot becomes viral, it discloses with the speed of a virus, and especially likely to be noticed by experts of child pornography.

The Internet Watch Foundation, a British charity expert in tracking and tracing of pedo-pornographic contents, said that this adolescents mode of sending self-portraits is widespread. The organization has tried to count how many risqué snapshots are taken and spread almost as a game that is collected from hard sites, reporting that the numbers are exorbitant and that the vast majority of hardcore videos and pictures generated by the young are taken from the original location to be published on adult sites. Even innocent shooting now constitute the main source of supply of sites for adults, with psychological, social and emotional damages uncountable for the teenagers. But the teenagers aren’t fully aware.

Needless to say to teenagers that it would be better not to release photos of themselves on the net: already in the first sharing you lose control of the image. In the event, however, it’s a mistake and you want to stop the process of that picture you can contact the police, which control everything that is broadcast on the network, especially protecting minors subject to all kinds of abuse. But it isn’t always enough to remove a photo from the websites and it’s good to know that, once posted on the web, a content may also reside there forever. The only solution may be control in real time from a distance what the kids commit to the computer. By inserting small monitoring tools, invisible to the user and therefore not limiting for those who are using your computer, you can control what is typed or is going to be posted and shared before it’s too late.


Are you a stalking victim? Here’s what to do

The crime of stalking occurs when someone (often a former partner) performs a series of acts (which may be threats or harassments, but also seemingly innocuous acts, such as continuous sending of unwanted messages, flowers, or letters) making psychological violence against the victim causing an understandable state of anxiety and fear or forcing him/her to change personal habits (to replace telephone user, change residence, etc.) or even causing a well-founded fear for his/her personal safety. Therefore, it’s an offense against the individual moral freedom.

Threats, beatings, harassments, in any way the offense is committed, the stalking situations key is constituted by the evidences. Only if you have evidences of the real situation you can take action and report out. For this reason, in many stalking cases are used bugs, hidden cameras and other monitoring tools that allow you to nail the culprit. In this field, the use of professional and reliable products is critical.

Not all stalking situations are alike, so it isn’t easy talk about the defense behaviors that must be adopted. However, there are some useful rules.
First, it’s useless to deny the problem. Often, you have difficulty to consider youself a “victim”, you tend to avoid to recognize in danger, only to underestimate the risk and thus facilitating the stalker.

If the harassment is the request to start or re-establish an unwanted relationship, you need to be firm to “say no” in a clear and unambiguous way. Other efforts to convince a persistent persecutor, including improvised psychological interpretations for “need of help”, will be read as a reaction to his behavior and thus represent reinforcements, as attentions. Even the return of an unwelcome gift, an anger phone call or a negative response to a letter are signs that reinforce the stalking.

Careful behaviors are very effective to defend against the violence threat: to go out without follow predictable habits, in peak times and in crowded places, perhaps bringing with them a selfdefence spray, to increase the feeling of security.

If you receive telephone harassments, it’s recommended to don’t change the number. Again, frustrations can increase the stalker motivation. It’s best to record phone calls in order to gain the evidences. It’s useful to keep on hand a cell phone to call in case of emergency. If you think to be in danger or followed, don’t rush home or in a friend’s home, but go promptly by the police.

Theft in the company: the video cameras unmask the unexpected

To give the alarm that there was a leak in the warehouse was the accountant. “What do you think you’re doing? There is a gap in sales”, he reprimanded the customer. The entrepreneur, a 43-year old with a prosperous trade activities in the food industry, was incredulous. No doubt, at that point, for the reason of the inconsistencies in the accounting books: someone was stealing in the warehouses.

An unfaithful employee? How to find out him? After days of anxieties and worries and sleepless nights, the entrepreneur has searched on the internet. He found an Italian company leader in the security and surveillance field and he called to this.
After a careful evaluation, he has placed four micro cameras at strategic points in the company and waited. So he discovered that the robbers were two unexpected in the company: a shipper and an employee. Licensed, have not been reported for theft but they were asked, through the Civil Court to return the amount of the stolen goods, about 60,000 euros.

But let’s see how they acted. The shipper was a man of thirty-seven, he loaded the truck and carried the goods to the destination. He cheated the company by changing the shipments. On the electronic register he marked, for example, ten bottles departing, in fact he took twenty bottles. The recorded ten bottles were sold regularly to the recipient, the ten in excess sold at undervalue. So the company suffered a double loss: the goods disappeared and decreased turnover as some customers were buying stolen goods more than regular, saving money and filling the pockets of the shipper.

The trick would go on for at least six months during which the employee would have cashed about 25 thousand euro. But his theft activities against the company was not limited to this, because in addition to the stolen merchandise for sale, there were the goods subtracted for his own consumption: the employee was shopping for himself and his family, for free, in the corporate warehouse.
The evidence gathered were placed in the recordings of the cameras in the company. The electronic eye would also picked up the illegal shopping of another unsuspecting employee, a reliable 43-year old who, according to the charges, she had stolen merchandise for years.

The two employees, after they were discovered, they have behaved differently. He, after admitting all, returned the 25 thousand euro established by the decree of the civil court. But she, that according to the court must give the company 35 thousand euro, would have tried (in vain) to make opposition.